Belkin F5D7630-4B, F5D7630-4A user manual Firewall, Understanding The Web-Based User Interface

Page 35
4.Firewall

UNDERSTANDING THE WEB-BASED USER INTERFACE

Note to Mac users: Original Apple AirPort products support 64-bit encryption only. Apple AirPort 2 products can support 64-bit or 128-bit encryption. Please check your product to see which version you are using. If you cannot configure your network with 128-bit encryption, try 64-bit encryption.

4.Firewall

Your Router is equipped with a firewall that will protect your network from a wide array of common hacker attacks including:

IP Spoofing

Land Attack

Ping of Death (PoD)

Denial of Service (DoS)

IP with zero length

Smurf Attack

TCP Null Scan

SYN flood

UDP flooding

Tear Drop Attack

ICMP defect

RIP defect

Fragment flooding

The firewall also masks common ports that are frequently used to attack networks. These ports appear to be “Stealth”, meaning that essentially they do not exist to a would-be hacker. You can turn the firewall function off if needed, however, it is recommended that you leave the firewall enabled. Disabling the firewall protection will not leave your network completely vulnerable to hacker attacks, but it is recommended that you leave the firewall enabled.

33

Image 35
Contents F5D7630-4A F5D7630-4B ADSL Modem with Built-In 802.11g Wireless RouterUser Manual TABLE OF CONTENTS Works with Both PCs and Mac Computers Key Features Integrated 802.11g Wireless Access PointINTRODUCTION OVERVIEWApplications and Advantages Integrated 10/100 4-Port SwitchSPI Firewall MAC Address FilteringGermany excluded Provided by local ISP Package ContentsSystem Requirements Front Panel Power LED PWRWireless Network LED KNOWING YOUR ROUTERLAN Ports Reset ButtonLAN Port-Status LEDs Rear PanelADSL Port a. Resetting the Routerb. Restoring the Factory Defaults Power JackPLACEMENT OF YOUR ROUTER Installing a Full-Rate Connection CONNECTING AND CONFIGURING YOUR ROUTERISP Settings Phone Line ConfigurationInstalling with a Splitter Installing a Splitterless Connection Attach to your Network Using Ethernet Cabling Configuring the RouterInstalling without a Splitter Step 1 Installing the Hardware LAN Port Status LEDs Step 3 Configuring the Router Using the Web-Based User InterfaceLogging out of the Router Logging into the Router1. Internet Sharing Setup Wizard2. Setting your ISP Connection Type to PPPoE or PPPoA NAVIGATING THE WEB BROWSER INTERFACE4. Setting your Connection Type to Multiple Protocol over ATM Mode 3. Setting your Connection Type to Disable Internet SharingDefault Gateway - Enter a default gateway IP address. If the Wireless ADSL Modem Router cannot find the destination address within its local network, it will forward the packets to the Default Gateway. Assigned by your ISP 1. Quick-Navigation Links 3. Internet Status Indicator4. Login/Logout Button UNDERSTANDING THE WEB-BASED USER INTERFACE5. Help Button 6. LAN Settings7. Features 8. Internet Settings1. LAN Settings Changing LAN Settings4. IP Pool 1. IP Address2. Subnet Mask 3. DHCP ServerDHCP Client List 6. Local Domain Name2. Internet WAN a b c d e f g h i j Setting your ISP Connection Type to PPPoE or PPPoAConnection Type a. Username - Enter the ISP assigned user name. Assigned by your ISP a b c d e Setting your ISP Connection Type to Disable Internet SharingSetting your ISP Connection Type to Multiple Protocol over ATM Channel and SSID DNS Domain Name Server Settings3. Wireless Changing the Wireless ChannelChanging the Wireless Network Name SSID Using the Wireless Mode Switch Using the ESSID Broadcast FeatureNote This advanced feature should be employed by advanced users only g Nitro Changing the Wireless Security SettingsSetting WPA Security Encryption/SecuritySetting WPA with server Settings Setting WPA-PSK no serverSetting WEP Encryption C3 03 0F AF 0F 4B B2 C3 D4 4B C3 D4 E7 = 128-bit key Using a Hexadecimal KeyAF 0F 4B C3 D4 = 64-bit key Tear Drop Attack ICMP defect RIP defect Fragment flooding 4. FirewallIP Spoofing Land Attack Ping of Death PoD Denial of Service DoS IP with zero length Smurf Attack TCP Null Scan SYN flood UDP floodingChoosing an Application Application Gateways SettingsClient IP Filters Entering Settings into the Virtual ServerVirtual Servers Access Control Schedule Rule URL BlockingFollow these steps to add a schedule 1. Click “Add Schedule Rule” DMZ Demilitarized Zone Restart Router UtilitiesRestore Factory Defaults Restarting the Router to Restore Normal OperationSaving/Backup Current Settings 2. Then, click “Restore” Restore Previous SettingsThe configuration is now saved Updating the Router’s Firmware Firmware UpdateSystem Settings Setting the Time and Time Zone Setting or Changing the Administrator PasswordChanging the Login Time-Out Setting Enabling Remote Management Enabling/Disabling UPnP Manually Configuring Network Settings in Mac OS up to MANUALLY CONFIGURING NETWORK SETTINGSManually Configuring Network Settings in Mac OS 3. Select “Built-in Ethernet” 2 next to “Show” in the Network menu Manually Configuring Network Settings in Windows 2000, NT, or XP Manually Configuring Network Settings in Windows 98 or Me Microsoft Internet Explorer 4.0 or Higher Recommended Web Browser SettingsNetscape Navigator 4.0 or Higher PPPoE Routing Mode, for multiple PCs GLOSSARYIP address Subnet MaskChannel and SSID PPPoA Routing Mode, for multiple PCsDisconnect after Application Gateways ESSID BroadcastEncryption Client IP filters Administrator Password UPnP Time and Time ZoneRemote Management Possible Cause/Solution TROUBLESHOOTINGProblem connect to the Router My wireless PC cannotModifications INFORMATIONFCC Statement DECLARATION OF CONFORMITY WITH FCC RULES FOR ELECTROMAGNETIC COMPATIBILITYEurope-European Union Notice Canada-Industry Canada ICBelkin Corporation Limited Lifetime Product Warranty Belkin Tech Support P74426ukBelkin Corporation Belkin Components B.V